Thursday, October 16, 2014

Security experts warn of 'POODLE' attack against SSL 3.0

Cisco advises users to lock down WebEx to prevent snooping | Security experts warn of 'POODLE' attack against SSL 3.0

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


What you should consider when choosing a password manager
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication. Read More


: Verizon

Mobile Device Management
In this eGuide, InfoWorld and sister publications IDG News Service, Network World, Computerworld, and CSO look at many of today's issues surrounding mobile security and MDM. Read on to learn how MDM can help your enterprise enable mobile security without hampering employee productivity. Learn More

: WhiteHat Security, Inc.

Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

Cisco advises users to lock down WebEx to prevent snooping
Cisco has warned customers to lock down WebEx after a security researcher and journalist found many big-name companies left some online meetings open for anyone to join. Read More

Security experts warn of 'POODLE' attack against SSL 3.0
Experts say that SSL 3.0 should be disabled even though some legacy products still use it. Read More

'Hurricane Panda' hackers used Microsoft zero-day, CrowdStrike says
The group, which targets technology infrastructure companies, is believed to be linked to China's government. Read More


WHITE PAPER: Wandera

Combat Hidden Threats to Your Mobile Environment
We only hear about the high profile cyber attacks in the news, but what about the every day threats affecting your organization right now? It's likely that you're already the unsuspecting victim of hidden mobile attacks. Find out what practical steps you can take to uncover and neutralize these threats. View now

YouTube served malicious advertisements, Trend Micro says
The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware. Read More

Hackers exploit two more Windows zero-day bugs
Microsoft will patch a pair of zero-day Windows vulnerabilities later today that attackers have been exploiting to penetrate major corporations' networks, researchers at FireEye said Tuesday. Read More

Bionym's wearable authentication device ships to developers
Nymi Band uses electrical signals in your heart to secure smartphone, laptop, car or office. Read More

Researcher builds system to protect against malicious insiders
When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating. Virginia Tech's Daphne Yao hopes the algorithms she's working on can stop that kind of attack. Read More


DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.